Results for: object detection - Page 6

Suggested Categories:

Object Storage Solutions
Object storage solutions are systems designed to store large amounts of unstructured data, such as multimedia files, backups, logs, and archives, in a highly scalable and accessible manner. These platforms break data into individual objects, each containing the data itself, metadata, and a unique identifier, which makes retrieval and management more efficient. Object storage is typically used for cloud storage environments, where flexibility, scalability, and redundancy are key. It allows organizations to store vast amounts of data with high durability, often offering features like automated data tiering, access controls, and encryption. Object storage solutions are ideal for businesses that need cost-effective, scalable, and secure storage for large datasets or growing volumes of unstructured data.
Intrusion Detection and Prevention Systems
Intrusion detection and prevention systems (IDPS) enable IT teams and IT security professionals to identify potential threats, intrusions, and attacks on an organization's networks, applications, or systems, as well as provide tools to prevent intrusions and attacks. They can block malicious traffic, alert security teams, and log events for further analysis. By using intrusion detection and prevention systems, organizations can enhance their cybersecurity posture, detect threats early, and respond quickly to potential security incidents.
Fraud Detection Software
Fraud detection software provides companies with the tools to evaluate and identify fraudulent activity and fraudulent transactions in order to prevent fraudulent access or financial fraud.
Bot Detection and Mitigation Software
Bot detection and mitigation software is designed to help organizations detect and protect against malicious bots or automated computer programs. The software uses sophisticated algorithms to monitor network traffic and identify suspicious activity, alerting administrators when a potential threat is detected. Once bot activity has been identified it provides the user with options to deal with the threat, including blocking access, tracking down the source of malicious activity, or quarantining infected files. Bot detection and mitigation software can also provide protection from data theft, distributed denial-of-service attacks (DDoS) and other online threats. With its ever-evolving capabilities, this type of software can be an invaluable tool in securing organizational systems and networks.
AI Object Removers
AI object removers are software tools that identify and remove objects from digital images. They use machine learning techniques to accurately detect a specific object or set of objects, such as people, cars, buildings, trees, and plants. Once identified, the algorithm will then delete the object from the image without altering any other information. This technology can be used for various applications including removing unwanted persons and objects from photos or videos.
Gun Detection Systems
Gun detection systems, also known as weapon detection systems, are systems that are designed to detect the presence of firearms. They often use AI, soundwave, video analytics, and radar technology to pinpoint the location of a firearm on a person or in a given area. Gun detection systems can be used in public spaces like schools, shopping malls, and other places with high foot traffic.
Anomaly Detection Software
Anomaly detection software identifies unusual patterns, behaviors, or outliers in datasets that deviate from expected norms. It uses statistical, machine learning, and AI techniques to automatically detect anomalies in real time or through batch analysis. This software is widely used in cybersecurity, fraud detection, predictive maintenance, and quality control. By flagging anomalies, it enables early intervention, reduces risks, and enhances operational efficiency. Advanced versions offer customizable thresholds, real-time alerts, and integration with analytics dashboards for deeper insights.
Disinformation Detection Tools
Disinformation detection tools are specific applications designed to help identify and mitigate false information. These tools use advanced algorithms to analyze digital content, such as text, images, and videos. They can also be used to detect potential manipulation of online activity and websites. In some cases, these tools are integrated into media platforms so that malicious actors cannot spread misinformation or disinformation.
Deepfake Detection Software
Deepfake detection software is an advanced technology that enables users to detect and analyze deepfake images, videos, and other AI-generated content. It leverages sophisticated machine learning models to identify manipulations of original media content. This software can detect subtle changes in facial expressions, voice patterns, and other visual elements such as blurriness or color discrepancies. It also employs image-processing techniques such as pixel analysis to discover when parts of a video have been tampered with. Deepfake detection software is becoming increasingly important for ensuring the authenticity of digital media content.
Liveness Detection Software
Liveness detection software is used to identify a person who is present at the time of an authentication process. This type of software uses biometric data to determine whether the individual being authenticated is alive or not. It can provide additional security for access control, financial transactions, and other digital activities where identity verification is required. Liveness detection works by using either facial recognition, fingerprint scanning, or other types of biometric measurements to confirm an individual's presence in real-time. The accuracy and reliability of the liveness detection process depend on using high-quality cameras and sensors that are sophisticated enough to detect subtle changes in body temperature, image quality, and motion.
Clash Detection Software
Clash detection software is used in construction and engineering to identify and resolve conflicts within 3D models, such as overlaps between structural, mechanical, or electrical elements. By analyzing Building Information Models (BIM), this software highlights design clashes early, reducing the risk of errors during construction. It provides visual reports and detailed information on each clash, allowing project teams to address issues before they become costly in the field. Integrated with other BIM tools, clash detection software improves collaboration by streamlining communication around detected conflicts. Ultimately, it helps save time, control project costs, and ensure a smoother construction process.
Device Detection Software
Device detection software is designed to identify and analyze devices that connect to a network or a website. It helps businesses and organizations understand the type, model, and operating system of a device, enabling better user experience and enhanced security. By recognizing the device specifications, it allows for personalized content delivery, ensuring compatibility with different screen sizes and functionalities.
Facial Recognition Software
Facial recognition software enables businesses and organizations to detect, identify, and analyze human faces and facial features. Facial recognition capabilities can be delivered via an API for use in third-party applications, offered as part of a standalone facial recognition application, or be included as a feature in computer vision or identity verification solutions.
AI Content Detection Tools
AI content detection tools are software tools designed to detect whether a piece of text was written by an artificial intelligence system. These tools compare the text to a library of known AI-generated phrases and sentences, scoring it based on its similarity to those examples. The results can help provide insight into how much of the text was written by AI versus a human writer.
Cloud Detection and Response (CDR) Software
Cloud detection and response software is a type of cybersecurity technology used to monitor the cloud environment for malicious activities. It uses automated processes to detect abnormal behavior, investigate suspected threats, and take action in real-time. The software can be tailored to an organization's specific security needs, allowing them to identify potential risks quickly and respond accordingly. With this type of solution in place, organizations can better protect their data against cyber attacks.
Endpoint Detection and Response (EDR) Software
Endpoint Detection and Response (EDR) software provides continuous monitoring and analysis of endpoint devices—such as laptops, desktops, and servers—to detect, investigate, and respond to cybersecurity threats in real-time. It uses behavioral analysis, threat intelligence, and machine learning to identify suspicious activities, malware, and advanced attacks that traditional antivirus solutions may miss. EDR platforms offer automated threat containment, root cause analysis, forensic investigations, and remediation tools to minimize damage and downtime. By providing detailed visibility into endpoint activities and fast incident response capabilities, EDR software enhances an organization’s overall security posture. It is widely deployed in enterprises to protect against evolving cyber threats and maintain regulatory compliance.
Managed Detection and Response (MDR) Services
Managed detection and response (MDR) software enables the monitoring of endpoint and network security in order to detect and solve potential threats.
Network Detection and Response (NDR) Software
Network detection and response (NDR) software and solutions enable organizations to monitor network activity to identify potential security threats, and alert teams of these potential threats when they arise.
Extended Detection and Response (XDR) Platforms
Extended detection and response (XDR) platforms enable organizations to discover and address cybersecurity incidents across disparate hybrid systems such as networks, applications, endpoints, and the cloud.
Data Breach Detection Software
Data breach detection software helps organizations identify and respond to unauthorized access or data leaks by monitoring networks, systems, and applications for suspicious activity. It uses advanced algorithms, machine learning, and real-time analysis to detect potential security threats and anomalies that could indicate a breach. The software often includes features like automated alerts, threat intelligence, and detailed reporting to enable quick investigation and mitigation. By continuously scanning for vulnerabilities and unusual behavior, it helps minimize the impact of data breaches and protects sensitive information. Ultimately, data breach detection software strengthens an organization's security posture and ensures compliance with data protection regulations.
View more categories (20) for "object detection"

239 Products for "object detection" with 1 filter applied:

  • 1
    PaperGen

    PaperGen

    PaperGen

    ... for making data-driven points in reports or presentations. PaperGen crafts content that feels authentic and engaging, blending automation and bypassing AI detection for any use cases. Create compelling case studies tailored to objectives. Discover, write, and cite relevant research with ease. Write blogs & articles faster to boost your SEO performance. Polish your writing to ensure plagiarism-free content.
    Starting Price: $6.49 per month
  • 2
    Intel Geti
    Intel® Geti™ software simplifies the process of building computer vision models by enabling fast, accurate data annotation and training. With capabilities like smart annotations, active learning, and task chaining, users can create models for classification, object detection, and anomaly detection without writing additional code. The platform also provides built-in optimizations, hyperparameter tuning, and production-ready models optimized for Intel’s OpenVINO™ toolkit. Designed to support...
  • 3
    ML.NET

    ML.NET

    Microsoft

    ML.NET is a free, open source, and cross-platform machine learning framework designed for .NET developers to build custom machine learning models using C# or F# without leaving the .NET ecosystem. It supports various machine learning tasks, including classification, regression, clustering, anomaly detection, and recommendation systems. ML.NET integrates with other popular ML frameworks like TensorFlow and ONNX, enabling additional scenarios such as image classification and object detection...
    Starting Price: Free
  • 4
    Rapid Monitor

    Rapid Monitor

    Rapid Global

    Rapid Global’s AI Safety Software is a computer vision platform designed to enhance workplace safety by detecting unsafe acts and hazardous conditions in real time. Compatible with most IP cameras, it seamlessly integrates with existing surveillance systems, ensuring easy deployment and secure, on-site data processing. Users can customize monitoring parameters by selecting specific objects, areas, and timeframes, and set tailored alarm notifications to identify unsafe behaviors as they occur...
    Starting Price: Free
  • 5
    Analytiks

    Analytiks

    Infillion

    ... access, API feeds, free Wi-Fi access via Cisco, and CRM integration. Users can receive SMS or email alerts when a venue reaches a critical occupancy point, allowing for immediate action. Analytiks ensures privacy compliance by performing people detection on the edge using code generated by Meraki's cameras, meaning video feeds remain on-premise and no personal information is collected. Instead, randomly generated object IDs and metadata are analyzed and displayed on a web-based dashboard.
  • 6
    evoML

    evoML

    TurinTech AI

    evoML accelerates the creation of production-quality machine learning models by streamlining and automating the end-to-end data science workflow, transforming raw data into actionable insights in days instead of weeks. It automates crucial steps, automatic data transformation that detects anomalies and handles imbalances, feature engineering via genetic algorithms, parallel model evaluation across thousands of candidates, multi-objective optimization on custom metrics, and GenAI-based synthetic...
  • 7
    Ultralytics

    Ultralytics

    Ultralytics

    Ultralytics offers a full-stack vision-AI platform built around its flagship YOLO model suite that enables teams to train, validate, and deploy computer-vision models with minimal friction. The platform allows you to drag and drop datasets, select from pre-built templates or fine-tune custom models, then export to a wide variety of formats for cloud, edge or mobile deployment. With support for tasks including object detection, instance segmentation, image classification, pose estimation...
  • 8
    DataGrip

    DataGrip

    JetBrains

    ..., so you can make your queries more efficient. DataGrip provides context-sensitive code completion, helping you to write SQL code faster. Completion is aware of the tables structure, foreign keys, and even database objects created in code you're editing. DataGrip detects probable bugs in your code and suggests the best options to fix them on the fly. It will immediately let you know about unresolved objects, using keywords as identifiers and always offers a way to fix the problems.
    Starting Price: $199 per year
  • 9
    Google Cloud Vision AI
    ... your models for accuracy, latency, and size; and export them to your application in the cloud, or to an array of devices at the edge. Google Cloud’s Vision API offers powerful pre-trained machine learning models through REST and RPC APIs. Assign labels to images and quickly classify them into millions of predefined categories. Detect objects and faces, read printed and handwritten text, and build valuable metadata into your image catalog.
  • 10
    Sonrai Security

    Sonrai Security

    Sonraí Security

    ... critical resource monitor continuously monitors your critical data sitting inside object stores (e.g. AWS S3, Azure Blob) and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are monitored across multiple cloud providers and 3rd party data stores. Resolutions are coordinated with relevant DevSecOps teams.
  • 11
    EventSentry

    EventSentry

    NETIKUS.NET ltd

    ... network traffic, can detect malicious activity and offers insight into bandwith usage. Keeping track of Active Directory changes is easy with EventSentry's ADMonitor component that records all changes to AD & Group Policy objects and provides a complete user inventory to help identify obsolete accounts. Various integrations & multi-tenancy available.
    Starting Price: $85.00/one-time
  • 12
    DevSkiller TalentScore
    ... are able to: • Screen tech skills fully remotely with online coding tests • Run online tech interviews and pair programming sessions with your candidates to understand their skills better • Identify bad actors early on with advanced plagiarism detection features • Reduce unconscious bias with objective automated test scoring TalentScore supports 200+ tech skills tested for multiple front end, back end, full stack, DevOps, data science, QA, and security roles across all seniority levels.
    Leader badge
    Starting Price: $499.00/month
  • 13
    AKIPS Network Monitor
    AKIPS Network Monitoring Software is a fully featured, fast and cost-effective network and infrastructure performance-monitoring tool. It delivers unmatched visibility across your network. AKIPS detects faults and performance issues. This empowers your business to maintain its operational state and minimise possible disruptions due to IT infrastructure failing or risk events occurring. AKIPS is a multi-award-winning company and prides itself on its innovative technology. Benefits...
  • 14
    piXserve

    piXserve

    piXlogic

    piXserve™ is an enterprise class application that automatically creates a searchable index of visual content in media files. piXserve scans digital images and videos, stores searchable descriptions of its contents, and assigns keywords to things it recognizes. piXserve can detect and recognize individual faces, objects, scenes, and text strings in a variety of languages. You can put piXserve to work on your archived media and on your live video sources. Use piXserve to help you discover, flag...
  • 15
    SentiVeillance SDK

    SentiVeillance SDK

    Neurotechnology

    SentiVeillance SDK is designed for developing software that performs biometric face identification, detects moving pedestrians or vehicles or other objects and performs automatic license plate recognition using live video streams from digital surveillance cameras. The SDK is used for passive identification – when passers-by do not make any efforts to be recognized. List of possible uses includes law enforcement, security, attendance control, visitor counting, traffic monitoring and other...
  • 16
    OptaliQ glauco
    Extend complex image analysis beyond human capabilities. Automatically detect and classify structural patterns. Optimize processing time and quality of image-based workflows. Augment visual assessments by objective and validated methods. Management tool for generation of high-quality diagnoses through peer-reviewed campaigns by medical experts; used as training data for machine learning. Our applications are cloud-ready AI-as-a-Service and also available as libraries for integration...
  • 17
    Nasuni

    Nasuni

    Nasuni

    The industry’s first ‘in-line’ edge detection combined with rapid ransomware recovery patent capabilities gives IT confidence to effectively mitigate cyber attacks. Nasuni is disrupting the file storage market with a cloud-based approach that replaces traditional on-premises primary and secondary file storage. Nasuni delivers a file storage platform that leverages object storage delivering a simpler, lower cost, and more efficient SaaS solution that scales easily to handle rapid unstructured...
  • 18
    UniteAR

    UniteAR

    iBoson Innovations

    ... create white labelled custom augmented reality apps for Android and iOS with the 100% design friendly App builder. XRmeet, the first of its kind no-code platform enables immersive digital assistance with Augmented Reality. An enterprise SaaS platform for AR-enabled remote assistance and object detection for providing self-service in installation and maintenance and other technical issues resolution.
  • 19
    Honeycomb

    Honeycomb

    Honeycomb.io

    Log management. Upgraded. With Honeycomb. Honeycomb is built for modern dev teams to better understand application performance, debug & improve log management. With rapid query, find unknown unknowns across system logs, metrics & traces with interactive charts for the deepest view against raw, high cardinality data. Configure Service Level Objective (SLOs) on what users care about so you cut-down noisy alerts and prioritize the work. Reduce on-call toil, ship code faster and keep customers...
    Starting Price: $70 per month
  • 20
    Telerik Test Studio

    Telerik Test Studio

    Progress Software

    ..., additional capabilities and improvements puts pressure all around. Meanwhile, most of the automated testing approaches aren’t designed to support QA testers without much coding experience. Simply record your test and use automated playback for an easy and fast way to craft your test and then run that same script to test multiple browsers. Maintenance is greatly reduced with patent-pending element detection, centralized object repository, intelligent suggestions and multi-mechanism element search.
  • 21
    Labelbox

    Labelbox

    Labelbox

    The training data platform for AI teams. A machine learning model is only as good as its training data. Labelbox is an end-to-end platform to create and manage high-quality training data all in one place, while supporting your production pipeline with powerful APIs. Powerful image labeling tool for image classification, object detection and segmentation. When every pixel matters, you need accurate and intuitive image segmentation tools. Customize the tools to support your specific use case...
  • 22
    BitSight

    BitSight

    BitSight

    Make data-driven decisions to reduce cyber risk with the world's leading security ratings platform. BitSight offers the most widely adopted Security Ratings solution with a mission to change the way the world addresses cyber risk. BitSight provides data-driven, dynamic measurements of an organization’s cybersecurity performance: derived from objective, verifiable information, material and validated measurements, created by a trusted, independent organization. BitSight for Security Performance...
  • 23
    V7 Darwin
    V7 Darwin is a powerful AI-driven platform for labeling and training data that streamlines the process of annotating images, videos, and other data types. By using AI-assisted tools, V7 Darwin enables faster, more accurate labeling for a variety of use cases such as machine learning model training, object detection, and medical imaging. The platform supports multiple types of annotations, including keypoints, bounding boxes, and segmentation masks. It integrates with various workflows through...
    Starting Price: $150
  • 24
    ISRA

    ISRA

    ISRA VISION AG

    High Precision 3D Metrology. Ensure zero-defect quality in all product deliveries and boost customer satisfaction: ISRA’s precision metrology systems measure all object and surface properties down to the nanometer level while ensuring the shortest cycle times. From precision measurements to defect detection, ISRA offers the right system for any inspection task. Our 3D measurement systems enable detailed inspections down to the nanometer level, whether in the test laboratory, during random...
  • 25
    PhotoDiva

    PhotoDiva

    PhotoDiva

    Are your photos missing the mark? Dull colors, lackluster lighting, and blotchy skin don't have to stay that way. You can fix it all for free in the PhotoDiva portrait photo editor! Get beautiful-looking portraits quickly by using one-click effects to make dramatic changes. Whether you need a boost of color or a full face of makeup, this portrait software delivers amazing results automatically. Change colors, enhance facial features, and remove objects easily with a few quick adjustments...
    Starting Price: $29.95 per license
  • 26
    Phase One Geospatial
    Medium and large format aerial imagery with the highest accuracy and reliability. Precision-driven high-resolution aerial imagery cameras and solutions that simplify mapping and surveying processes. Effortless execution of photogrammetry mapping missions, capturing high-resolution images for 2D and 3D mapping. Achieve large surface coverage at extremely high resolution for accurate inspection of the objects as well as the surrounding areas. Get millimeter-sized damage spotting detection, fast...
  • 27
    Ashampoo Photo Optimizer
    Ashampoo Photo Optimizer 8 enhances your photos at the click of a button! The program fully automatically adjusts colors, contrasts and exposure settings to perfection for individual images or entire collections. Visual blemishes are detected and fixed through careful image analysis. But you can also make adjustments manually: Straighten slanted image horizons, fix perspective distortions or apply numerous affects. Minor blemishes like red eyes, skin imperfections or stains are also easily...
    Starting Price: $29.99
  • 28
    Infinite Design

    Infinite Design

    Infinite Studio LLC

    Rebuilt from the ground up: blazing fast, incredibly stable, with an improved interface. Infinite canvas (pan, zoom, or rotate). Intuitive path editing. Boolean operations. Align and distribute objects. Experiment with four types of symmetry. Unlimited layers. Unlimited undo with a history slider; scrub through from start to finish. Easily construct shapes with the pen tool. Draw 3D cityscapes with five different perspective guides. Text tool: horizontal, vertical, circle, or text on path. It...
  • 29
    PatPat360

    PatPat360

    PatPat360

    A social network that makes employees feel part of a supportive community and meets Millennials’ expectations. An OKR-based goal-setting approach to align individual, team, and company goals and move from individual success to collective growth. Different types of praise and rewards to establish a culture of feedback and recognition that makes talent shine and evolve. A set of modular features that empowers leaders to define challenging objectives, manage evaluations, and allocate rewards...
    Starting Price: $1.5 per user per month
  • 30
    NVIDIA DIGITS

    NVIDIA DIGITS

    NVIDIA DIGITS

    The NVIDIA Deep Learning GPU Training System (DIGITS) puts the power of deep learning into the hands of engineers and data scientists. DIGITS can be used to rapidly train the highly accurate deep neural network (DNNs) for image classification, segmentation and object detection tasks. DIGITS simplifies common deep learning tasks such as managing data, designing and training neural networks on multi-GPU systems, monitoring performance in real-time with advanced visualizations, and selecting...